Yea, it's something I'll definitely recommend for people asking how to get started in exploit development. It didn't go beyond an overview of OSCP-level exploit development, but it answered a lot of common questions that would be useful for novices looking to get a jump-start.

It's too bad he cut out the advanced material due to time constraints; that was mainly what I was looking for. Hopefully he goes through with a separate webinar on that material.

The chapters on exploit development in PWB are actually very well done. The material Joe talked about is similar, but not quite in as much detail as the way muts explains it in the course. I was hoping for more on the advanced stuff as well, but otherwise, I thought it was a good webinar. Definitely looking forward to more.

m0wgli wrote:Would you say that someone who followed all advice given would be sufficiently prepared for the OSCP in terms of exploit development? Or would additional resources be required?

I think you'd be sufficiently prepared to start the course. Like Shadowzero said, the course provides some excellent guidance here. However, I'd still recommend supplementing the course with the SecurityTube assembly videos, and the SecurityTube and Corelan overflow tutorials.

Will watch the slides and video when available since this interest me a lot. I have a basic understanding of the various methods but no real hands on. One thing I always wonder is how to find vulnerable code. Never done much fuzzing and not enough coding experience to spot programming errors in source code.

I know of Corelan and will watch the security tube vids (although I can;t stand the accent). Any other recommendations on the fuzzing / finding vulns side of things?